Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unknown | Web Directory Free | 0 ~ 1.7.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-3552 Web Directory Free <= 1.6.9 - Unauthenticated SQL Injection | https://github.com/truonghuuphuc/CVE-2024-3552-Poc | POC Details |
| 2 | The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3552.yaml | POC Details |
| 3 | None | https://github.com/KiPhuong/cve-2024-3552 | POC Details |
| 4 | None | https://github.com/KiPhuong/challenge-cve-2024-3552 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet